Collection of Offensive C# Tooling
☆13Nov 4, 2021Updated 4 years ago
Alternatives and similar repositories for OffensiveCSharp
Users that are interested in OffensiveCSharp are comparing it to the libraries listed below
Sorting:
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Cobalt Strike random C2 Profile generator☆16Nov 10, 2025Updated 3 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated last month
- Download a .NET payload and run it on memory☆70Apr 12, 2019Updated 6 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆169Jan 25, 2024Updated 2 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 8 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- ☆33Jan 23, 2025Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆64Oct 16, 2024Updated last year
- Injecting shellcode into a process memory and executing it in C#☆52Oct 2, 2022Updated 3 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 6 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- Simple parser to get useful information from AWS S3 logs☆27Sep 5, 2021Updated 4 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- Bypass AMSI by patching AmsiScanBuffer☆279Jun 4, 2021Updated 4 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆34Aug 4, 2021Updated 4 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆40Sep 16, 2021Updated 4 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- ☆10Aug 9, 2024Updated last year
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆33Dec 10, 2019Updated 6 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.